
Summary
This rule monitors for failed login attempts in OneLogin where the user is marked with a high risk factor. Specifically, it targets authentication attempts that have a risk score above 50 but ultimately fail. Such events may indicate potentially malicious login attempts, which necessitate further investigation to understand the underlying reasons for the user's high risk classification. The rule utilizes logs from OneLogin events to identify these occurrences and flags them for review.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
- Network Traffic
Created: 2022-09-02